U.S. patent application number 17/702729 was filed with the patent office on 2022-07-21 for vehicle communication method, apparatus, storage medium and program product.
The applicant listed for this patent is Apollo Intelligent Connectivity (Beijing) Technology Co., Ltd.. Invention is credited to LIANG CAO, ZHENZHEN SHI, SHUANGHE ZHU.
Application Number | 20220232014 17/702729 |
Document ID | / |
Family ID | |
Filed Date | 2022-07-21 |
United States Patent
Application |
20220232014 |
Kind Code |
A1 |
SHI; ZHENZHEN ; et
al. |
July 21, 2022 |
VEHICLE COMMUNICATION METHOD, APPARATUS, STORAGE MEDIUM AND PROGRAM
PRODUCT
Abstract
The present disclosure provides a vehicle communication method,
apparatus, storage medium and program product, which relates to the
field of artificial intelligence. The method includes: acquiring
first root verification information and a first download address
corresponding to a first area, and second root verification
information and a second download address corresponding to a
vehicle; downloading first sub-verification information
corresponding to the first area according to the first download
address, where the first root verification information is used to
verify correctness of the first sub-verification information;
downloading second sub-verification information corresponding to
the vehicle according to the second download address, where the
second root verification information is used to verify correctness
of the second sub-verification information; communicating with a
communication device within the first area according to the first
root verification information, the first sub-verification
information, the second root verification information and the
second sub-verification information.
Inventors: |
SHI; ZHENZHEN; (BEIJING,
CN) ; ZHU; SHUANGHE; (BEIJING, CN) ; CAO;
LIANG; (BEIJING, CN) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
Apollo Intelligent Connectivity (Beijing) Technology Co.,
Ltd. |
Beijing |
|
CN |
|
|
Appl. No.: |
17/702729 |
Filed: |
March 23, 2022 |
International
Class: |
H04L 9/40 20060101
H04L009/40; G07C 5/00 20060101 G07C005/00; G08G 1/01 20060101
G08G001/01 |
Foreign Application Data
Date |
Code |
Application Number |
May 14, 2021 |
CN |
202110528816.1 |
Claims
1. A vehicle communication method, comprising: acquiring first root
verification information and a first download address corresponding
to a first area, and second root verification information and a
second download address corresponding to the vehicle; downloading
first sub-verification information corresponding to the first area
according to the first download address, wherein the first root
verification information is used to verify correctness of the first
sub-verification information; downloading second sub-verification
information corresponding to the vehicle according to the second
download address, wherein the second root verification information
is used to verify correctness of the second sub-verification
information; and communicating with a communication device within
the first area according to the first root verification
information, the first sub-verification information, the second
root verification information and the second sub-verification
information.
2. The method according to claim 1, wherein the acquiring first
root verification information and a first download address
corresponding to a first area, and second root verification
information and a second download address corresponding to the
vehicle comprises: acquiring access verification information from a
server corresponding to the first area, wherein the access
verification information comprises the first root verification
information and the first download address corresponding to the
first area, and the second root verification information and the
second download address corresponding to the vehicle.
3. The method according to claim 2, wherein the acquiring access
verification information from a server corresponding to the first
area comprises: sending a download request to the server
corresponding to the first area according to a download address of
the access verification information, wherein the download request
comprises authentication information of the vehicle, and the
authentication information is used to authenticate the download
request; and receiving the access verification information sent by
the server corresponding to the first area.
4. The method according to claim 3, further comprising: sending a
vehicle registration request to the server corresponding to the
first area, wherein the vehicle registration request comprises the
authentication information of the vehicle, and the authentication
information is used to authenticate the vehicle registration
request; and receiving the download address of the access
verification information sent by the server corresponding to the
first area.
5. The method according to claim 4, wherein the sending a vehicle
registration request to the server corresponding to the first area
comprises: receiving the authentication information and a vehicle
registration service interface sent by a server corresponding to
the vehicle, wherein the authentication information and the vehicle
registration service interface are acquired in advance by the
server corresponding to the vehicle from the server corresponding
to the first area; and sending the vehicle registration request to
the server corresponding to the first area according to the vehicle
registration service interface.
6. The method according to claim 1, wherein the communicating with
a communication device within the first area according to the first
root verification information, the first sub-verification
information, the second root verification information and the
second sub-verification information comprises: importing the first
root verification information, the first sub-verification
information, the second root verification information and the
second sub-verification information into trust verification
information of the vehicle; and communicating with the
communication device within the first area according to the trust
verification information.
7. A vehicle communication method, comprising: receiving a download
request sent by the vehicle, wherein the download request is used
to request to download access verification information, the
download request comprises authentication information of the
vehicle, and the access verification information comprises a first
download address of first sub-verification information and first
root verification information corresponding to a first area, and a
second download address of second sub-verification information and
second root verification information corresponding to the vehicle;
and authenticating the download request according to the
authentication information, and sending the access verification
information to the vehicle after authentication is passed.
8. The method according to claim 7, further comprising: receiving a
vehicle registration request sent by the vehicle, wherein the
vehicle registration request comprises the authentication
information; and authenticating the vehicle registration request
according to the authentication information, and sending a download
address of the access verification information to the vehicle after
authentication is passed.
9. The method according to claim 8, further comprising: receiving a
mutual trust registration request sent by a server corresponding to
the vehicle, wherein the mutual trust registration request
comprises verification information corresponding to the server
corresponding to the vehicle; adding the verification information
corresponding to the server corresponding to the vehicle into the
access verification information, and generating the authentication
information; and sending the authentication information and a
vehicle registration service interface to the server corresponding
to the vehicle, so that the server corresponding to the vehicle
sends the authentication information and the vehicle registration
service interface to the vehicle.
10. The method according to claim 9, wherein the verification
information corresponding to the server corresponding to the
vehicle comprises the second download address of the second
sub-verification information and the second root verification
information.
11. The method according to claim 9, wherein the verification
information corresponding to the server corresponding to the
vehicle comprises sub-verification information corresponding to the
server corresponding to the vehicle; the adding the verification
information corresponding to the server corresponding to the
vehicle into the access verification information comprises:
generating the second sub-verification information and the second
root verification information according to the sub-verification
information corresponding to the server corresponding to the
vehicle and sub-verification information corresponding to other
servers corresponding to other vehicles; and adding the second
download address of the second sub-verification information and the
second root verification information into the access verification
information.
12. A vehicle communication method, comprising: acquiring
authentication information and a vehicle registration service
interface from a server corresponding to a first area; and sending
the authentication information and the vehicle registration service
interface to the vehicle; wherein the vehicle registration service
interface is used to send a vehicle registration request to the
server corresponding to the first area, to obtain a download
address of access verification information; the authentication
information is used to authenticate the vehicle registration
request, and the access verification information comprises a first
download address of first sub-verification information and first
root verification information corresponding to the first area, and
a second download address of second sub-verification information
and second root verification information corresponding to the
vehicle.
13. The method according to claim 12, wherein the acquiring
authentication information and a vehicle registration service
interface from a server corresponding to a first area comprises:
sending a mutual trust registration request to the server
corresponding to the first area, wherein the mutual trust
registration request comprises verification information
corresponding to a server corresponding to the vehicle; and
receiving the authentication information and the vehicle
registration service interface sent by the server corresponding to
the first area.
14. The method according to claim 12, wherein the verification
information corresponding to the server corresponding to the
vehicle comprises the second download address of the second
sub-verification information and the second root verification
information.
15. The method according to claim 11, wherein the verification
information corresponding to the server corresponding to the
vehicle comprises sub-verification information corresponding to the
server corresponding to the vehicle.
16. An electronic device, comprising: at least one processor; and a
memory communicatively connected to the at least one processor;
wherein the memory stores an instruction executable by the at least
one processor, and the instruction is executed by the at least one
processor to cause the at least one processor to execute the method
according to claim 1.
17. An electronic device, comprising: at least one processor; and a
memory communicatively connected to the at least one processor;
wherein the memory stores an instruction executable by the at least
one processor, and the instruction is executed by the at least one
processor to cause the at least one processor to execute the method
according to claim 7.
18. An electronic device, comprising: at least one processor; and a
memory communicatively connected to the at least one processor;
wherein the memory stores an instruction executable by the at least
one processor, and the instruction is executed by the at least one
processor to cause the at least one processor to execute the method
according to claim 12.
19. A non-transitory computer readable storage medium storing a
computer instruction, the computer instruction is used to cause a
computer to execute the method according to claim 1.
20. A non-transitory computer readable storage medium storing a
computer instruction, the computer instruction is used to cause a
computer to execute the method according to claim 7.
Description
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application claims priority to Chinese Patent
Application No. 202110528816.1, filed on May 14, 2021, which is
hereby incorporated by reference in its entirety.
TECHNICAL FIELD
[0002] Embodiments of the present disclosure relate to artificial
intelligence technology, and in particular, to a vehicle
communication method, apparatus, storage medium and program
product, which can be applied in the field of intelligent drive and
vehicle to X.
BACKGROUND
[0003] As the result of the development of technology of vehicle to
X (V2X), traffic participants such as vehicles, road
infrastructures and pedestrians are mutually connected, having
formed a new application scenario with mutual connection and
communication.
[0004] Currently, a batch of intelligent traffic areas have already
been established in many regions, and mutual trust and
communication between local V2X devices can be achieved in the
intelligent traffic area. At the same time, many entities such as
alliance ecology, organization and vehicle company original
equipment manufacturer (OEM) are also involved in the field of
intelligent traffic.
SUMMARY
[0005] The present disclosure provides a vehicle communication
method, apparatus, storage medium and program product for realizing
mutual trust and communication between vehicles.
[0006] According to a first aspect of the present disclosure, a
vehicle communication method is provided, including:
[0007] acquiring first root verification information and a first
download address corresponding to a first area, and second root
verification information and a second download address
corresponding to the vehicle;
[0008] downloading first sub-verification information corresponding
to the first area according to the first download address, where
the first root verification information is used to verify
correctness of the first sub-verification information;
[0009] downloading second sub-verification information
corresponding to the vehicle according to the second download
address, where the second root verification information is used to
verify correctness of the second sub-verification information;
and
[0010] communicating with a communication device within the first
area according to the first root verification information, the
first sub-verification information, the second root verification
information and the second sub-verification information.
[0011] According to a second aspect of the present disclosure, a
vehicle communication method is provided, including:
[0012] receiving a download request sent by the vehicle, where the
download request is used to request to download access verification
information, the download request includes authentication
information of the vehicle, and the access verification information
includes a first download address of first sub-verification
information and first root verification information corresponding
to a first area, and a second download address of second
sub-verification information and second root verification
information corresponding to the vehicle; and
[0013] authenticating the download request according to the
authentication information, and sending the access verification
information to the vehicle after authentication is passed.
[0014] According to a third aspect of the present disclosure, a
vehicle communication method is provided, including:
[0015] acquiring authentication information and a vehicle
registration service interface from a server corresponding to a
first area; and
[0016] sending the authentication information and the vehicle
registration service interface to the vehicle;
[0017] where the vehicle registration service interface is used to
send a vehicle registration request to the server corresponding to
the first area, to obtain a download address of access verification
information; the authentication information is used to authenticate
the vehicle registration request, and the access verification
information includes a first download address of first
sub-verification information and first root verification
information corresponding to the first area, and a second download
address of second sub-verification information and second root
verification information corresponding to the vehicle.
[0018] According to a fourth aspect of the present disclosure, an
electronic device is provided, including:
[0019] at least one processor; and
[0020] a memory communicatively connected to the at least one
processor; where
[0021] the memory stores an instruction executable by the at least
one processor, and the instruction is executed by the at least one
processor to cause the at least one processor to execute the method
according to the first aspect, the second aspect or the third
aspect.
[0022] According to a fifth aspect of the present disclosure, a
non-transitory computer readable storage medium storing a computer
instruction is provided, where the computer instruction is used to
cause a computer to execute the method according to the first
aspect, the second aspect or the third aspect.
[0023] According to the technical solution of the present
disclosure, mutual trust and communication between a vehicle and a
V2X device in an intelligent traffic area are achieved.
[0024] It should be understood that what is described in this
section is not intended to identify key or important features of
the embodiments of the present disclosure, nor is it used to limit
the scope of the present disclosure. Other features of the present
disclosure will be easily understood from the following
description.
BRIEF DESCRIPTION OF DRAWINGS
[0025] The drawings are used for a better understanding of this
solution and do not constitute a limitation of the present
disclosure, where:
[0026] FIG. 1 is a schematic diagram of an intelligent traffic
scenario;
[0027] FIG. 2 is a flowchart diagram of a vehicle communication
method provided by an embodiment of the present disclosure;
[0028] FIG. 3 is a flowchart diagram of a vehicle communication
method provided by an embodiment of the present disclosure;
[0029] FIG. 4 is a flowchart diagram of a vehicle communication
method provided by an embodiment of the present disclosure;
[0030] FIG. 5 is a flowchart diagram of a vehicle communication
method provided by an embodiment of the present disclosure;
[0031] FIG. 6 is a schematic diagram of a trusted certificate list
provided by an embodiment of the present disclosure;
[0032] FIG. 7 is a structural schematic diagram of a vehicle
communication apparatus provided by an embodiment of the present
disclosure;
[0033] FIG. 8 is a structural schematic diagram of a vehicle
communication apparatus provided by an embodiment of the present
disclosure;
[0034] FIG. 9 is a structural schematic diagram of a vehicle
communication apparatus provided by an embodiment of the present
disclosure; and
[0035] FIG. 10 is a schematic block diagram of an electronic device
used to realize the vehicle communication method of the embodiments
of the present disclosure.
DESCRIPTION OF EMBODIMENTS
[0036] The following description of illustrative embodiments of the
present disclosure will be made with reference to the accompanying
drawings, which include various details of the embodiments of the
present disclosure to facilitate understanding, and they should be
regarded as illustrative only. Therefore, those of ordinary skill
in the art should realize that various changes and modifications
can be made to the embodiments described herein without departing
from the scope and spirit of the present disclosure. Similarly, for
clarity and conciseness, descriptions of well-known functions and
structures are omitted in the following description.
[0037] FIG. 1 is a schematic diagram of an intelligent traffic
scenario. As shown in FIG. 1, a city is an intelligent traffic
demonstration area, and V2X devices in this city are managed by the
city's security certificate management system service (SCMS). By
constructing the city's certificate system (or referred to as trust
system and identity system), mutual trust among V2X devices can be
realized, so that V2X devices in this city can communicate with
each other by using the certificate of this certificate system. At
the same time, some entities such as alliance ecology,
organization, vehicle company OEM, etc., also ensure mutual trust
and communication between their respective V2X devices through
their respective certification systems. Illustratively, V2X devices
can be roadside devices, vehicles, vehicle-mounted electronic
devices, etc.
[0038] As shown in FIG. 1, one certificate system may include a
root certificate authority (RCA), and an intermediate certificate
authority (ICA) of lower level, a pseudonym certificate authority
(PCA), an enrollment certificate authority (ECA) and an application
certificate authority (ACA).
[0039] The RCA is a CA with highest level in one public key
infrastructure (PM) system in a V2X security system. The RCA first
needs to issue a self-signed certificate to itself, where the
self-signed certificate is also referred to as a root certificate,
and the root certificate is an end point of all certificate chains
in a PM system, that is, the trust anchor of the PM system. The RCA
can issue a sub-CA certificate, such as an ECA certificate, a PCA
certificate and an ACA certificate, etc., to a subordinate CA
according to requirement. The ECA is responsible for issuing a
registration certificate to a V2X device such as an on-board unit
(OBU), a road side unit (RSU) and a V2X service provider (VSP),
etc. The PCA is responsible for issuing a pseudonym certificate to
the OBU. The ACA is also referred to as an application
authorization CA (AACA), which is in responsible for issuing an
identify certificate to the OBU, and issuing an application
certificate to the V2X device such as the RSU and the VSP. The ICA
is located between the RCA and the CA that issues registration
certificates and various authorization certificates, and the ICA is
used to expand the hierarchy of the PM system and realize
multi-level deployment and multi-level management of the CA.
[0040] For the aforementioned various entities, the alliance
ecology has its own certificate system, that is, its own RCA; the
organization usually belongs to a certain certification system and
usually has its own ICA; and the vehicle company OEM also belongs
to a certain certification system, and usually has its own ECA and
PCA. However, the certificate systems of these entities are all
developed independently, and they are also independent of the
certificate system of the aforementioned intelligent traffic
demonstration area. For example, the certificate system of the
intelligent traffic demonstration area is called a local
certificate system, and the certificate systems of other various
entities are called external certificate systems. After entering
the intelligent traffic demonstration area, the vehicle of these
entities cannot realize mutual trust and communication with V2X
device in the intelligent traffic demonstration area.
Illustratively, a vehicle company OEM belongs to a certificate
system different from that of the intelligent traffic demonstration
area. The vehicles of this vehicle company OEM can communicate with
each other through the certificate of this vehicle company OEM.
However, after driving to the intelligent traffic demonstration
area, the vehicles of this vehicle company OEM cannot realize
mutual trust and communication with other V2X devices in the
intelligent traffic demonstration area.
[0041] To solve the above problem, in the vehicle communication
method provided by the embodiment of the present disclosure, a
vehicle outside the intelligent traffic area can not only acquire
verification information for communication corresponding to the
vehicle itself, but also acquire verification information for
mutual communication between V2X devices within the intelligent
traffic area, where the verification information may specifically
include root verification information and sub-verification
information, the root verification information is used to verify
the sub-verification information, to ensure correctness and
security of the verification information, so that the vehicle
outside the intelligent traffic area can realize mutual trust and
communication to V2X devices within the intelligent traffic area by
using verification information corresponding to the vehicle and
verification information corresponding to the intelligent traffic
area.
[0042] In the following, the vehicle communication method provided
by the present disclosure will be described in detail with
reference to specific embodiments. The vehicle communication method
relates to the field of artificial intelligence, and in particular,
to the field of intelligent drive and vehicle to X. It shall be
understood that, the following specific embodiments may be combined
with each other, and same or similar concepts or processes may not
be repeated in some embodiments.
[0043] FIG. 2 is a flowchart diagram of a vehicle communication
method provided by an embodiment of the present disclosure.
Execution subject of the method may be a vehicle, a vehicle-mounted
device, etc. As shown in FIG. 2, the method includes:
[0044] S201, acquiring first root verification information and a
first download address corresponding to a first area, and second
root verification information and a second download address
corresponding to a vehicle.
[0045] The first area in the embodiment of the present disclosure
is used to represent an intelligent traffic area, and V2X devices
within the intelligent traffic area can verify identity of each
other by using verification information corresponding to the
intelligent traffic area to realize mutual communication. In the
present embodiment, verification information corresponding to the
first area includes first sub-verification information and the
first root verification information corresponding to the first
area.
[0046] Correspondingly, as mentioned above, a vehicle usually
belongs to an entity such as an alliance ecology, an organization
or a vehicle company OEM, and verification information
corresponding to the vehicle is verification information
corresponding to the entity, V2X devices of the entity can verify
identity of each other by using the verification information
corresponding to the entity to realize mutual communication, and
verification information corresponding to the vehicle also include
second root verification information and second sub-verification
information.
[0047] For the first area or the vehicle, the sub-verification
information may be multiple, thus sub-verification information can
adopt an indirect storage manner and be stored in a position
corresponding to a download address. For example, the first
sub-verification information corresponds to the first download
address, and the second sub-verification information corresponds to
the second download address.
[0048] S202, downloading the first sub-verification information
corresponding to the first area according to the first download
address, and downloading the second sub-verification information
corresponding to the vehicle according to the second download
address.
[0049] After acquiring the first download address and the second
download address, the vehicle may download the first
sub-verification information and the second sub-verification
information respectively, and the vehicle may verify correctness of
the first sub-verification information by using the first root
verification information, and verify correctness of the second
sub-verification information by using the second root verification
information.
[0050] S203, communicating with a communication device within the
first area according to the first root verification information,
the first sub-verification information, the second root
verification information and the second sub-verification
information.
[0051] Upon acquiring the first sub-verification information and
the first root verification information corresponding to the first
area and its own second root verification information and the
second sub-verification information, the vehicle may communicate
with the communication device within the first area by using such
verification information. The communication device may be a V2X
device, such as a vehicle, a road side device, etc.
[0052] In the vehicle communication method provided by the
embodiment of the present disclosure, a vehicle outside the first
area can acquire the verification information corresponding to the
vehicle itself and the verification information corresponding to
the first area, thereby realizing mutual trust and communication
with the communication device within the intelligent traffic area
by using the verification information corresponding to the vehicle
and the verification information corresponding to the intelligent
traffic area.
[0053] Further description will be made on the basis of the above
mentioned embodiment. In the embodiment of the present disclosure,
the first root verification information and the first download
address corresponding to the first area, and the second root
verification information and the second download address
corresponding to the vehicle can be managed through a mutual trust
platform. The mutual trust platform may be a server, a cloud
server, a cloud platform, etc., and it will be illustrated by
taking the server as an example, a mutual trust platform
corresponding to the first area is a server corresponding to the
first area, that is, the vehicle can acquire access verification
information from the server corresponding to the first area, where
the access verification information includes the first root
verification information and the first download address
corresponding to the first area, and the second root verification
information and the second download address corresponding to the
vehicle.
[0054] To describe with reference to practical application, the
first root verification information corresponding to the first area
is a root certificate of a local certificate system of the first
area, and the first sub-verification information is a trusted
domain certificate list of the local certificate system of the
first area. The second root verification information corresponding
to the vehicle is a root certificate of an external certificate
system to which the vehicle belongs, and the second
sub-verification information corresponding to the vehicle is a
trusted domain certificate list of the external certificate system
to which the vehicle belongs.
[0055] The mutual trust platform is used to manage related
information of certificates of the local certificate system of the
intelligent traffic area and the external certificate system.
Illustratively, taking the first area as an example, the mutual
trust platform of the first area can maintain one trusted root
certificate list (TRCL), and the trusted root certificate list is
the above mentioned access verification information, and the
trusted root certificate list includes the root certificate and a
download address of the trusted domain certificate list of the
local certificate system of the first area, and further includes a
root certificate and a download address of a trusted domain
certificate list of at least one external certificate system, where
the at least one external certificate system includes the external
certificate system to which the vehicle belongs. The external
certificate system may be a certificate system of the above
mentioned V2X alliance ecology, a certificate system of the V2X
organization or a certificate system of the vehicle company OEM,
where such alliance ecology, organization and vehicle company OEM
all have subordinate V2X devices. The domain certificate is another
certificate other than the root certificate, for example, an ICA
certificate, an ECA certificate, a PCA certificate, an ACA
certificate, etc.
[0056] When the vehicle belongs to the external certificate system
needs to communicate with the local V2X device of the intelligent
traffic area, for example, when a vehicle of an external
certificate system drives to an intelligent traffic area, the
vehicle can acquire the trusted root certificate list from the
mutual trust platform of the intelligent traffic area, and then
acquire respective root certificates and download addresses of
trusted domain certificate lists of all certificate systems
maintained by the mutual trust platform, and such certificate
systems include the root certificate and the download address of
the trusted domain certificate list of the external certificate
system to which the vehicle itself belongs.
[0057] It can be understood that, the vehicle belonging to the
external certificate system can acquire the root certificate and
the download address of the trusted domain certificate list of the
local certificate system of the area corresponding to the mutual
trust platform, and can also acquire root certificates and download
addresses of trusted domain certificate lists of the external
certificate system to which the vehicle itself belongs and other
external certificate systems. Apparently, the local V2X device of
the intelligent traffic area can also acquire the root certificate
and the download address of the trusted domain certificate list of
the at least one external certificate system from the mutual trust
platform.
[0058] The vehicle can download trusted domain certificate lists of
respective certificate systems according to download addresses of
trusted domain certificate lists of respective certificate systems
included in the trusted root certificate list, that is, to obtain
trusted domain certificate lists of all certificate systems
maintained in the mutual trust platform of the intelligent traffic
area.
[0059] After acquiring root certificates and trusted domain
certificate lists of all certificate systems maintained by the
mutual trust platform, the vehicle can communicate with the V2X
device in the intelligent traffic area corresponding to the mutual
trust platform. It can be understood that, the vehicle not only can
communicate with the local V2X device, but also can communicate
with V2X devices subordinated in other external certificate systems
maintained by the mutual trust platform.
[0060] In the vehicle communication method of the embodiment of the
present disclosure, the vehicle can acquire the trusted root
certificate list from the mutual trust platform of one intelligent
traffic area, so as to acquire related information of the
certificate of the local certificate system and the external
certificate system of the intelligent traffic area maintained
therein, thereby realizing mutual trust and communication to the
local V2X device of the intelligent traffic area and the V2X device
subordinated in the external certificate system in the intelligent
traffic area.
[0061] FIG. 3 is a flowchart diagram of a vehicle communication
method provided by an embodiment of the present disclosure. The
method is applied to a server corresponding to a first area. As
shown in FIG. 3, the method includes:
[0062] S301, receiving a download request sent by a vehicle, where
the download request includes authentication information of the
vehicle.
[0063] The download request is used to request to download access
verification information, where the access verification information
includes a first download address of first sub-verification
information and first root verification information corresponding
to the first area, and a second download address of second
sub-verification information and second root verification
information corresponding to the vehicle.
[0064] The access verification information in the embodiment of the
present disclosure is the same as that in the above mentioned
embodiments, which will not be repeated herein. The server
corresponding to the first area receives the download request sent
by the vehicle, where the authentication information included in
the download request may be provided in advance by the server
corresponding to the first area, such that the server corresponding
to the first area can authenticate the download request according
to the authentication information.
[0065] S302, authenticating the download request according to the
authentication information, and sending the access verification
information to the vehicle after authentication is passed.
[0066] The server corresponding to the first area can authenticate
the download request of the vehicle according to an identifier of
the vehicle and the authentication information, for example,
determine whether the authentication information of the vehicle is
expired and so on, and after the authentication is passed, the
server corresponding to the first area can send the access
verification information to the vehicle, so that the vehicle can
acquire the first sub-verification information and the first root
verification information corresponding to the first area, and the
second sub-verification information and the second root
verification information corresponding to the vehicle according to
the access verification information, thereby realizing mutual trust
and communication to a communication device in the first area.
[0067] In the vehicle communication method in the embodiment of the
present disclosure, the access verification information is
maintained in the server corresponding to the first area, and the
vehicle can request to the server corresponding to the first area
to download the access verification information, thereby realizing
mutual trust and communication to the communication device of the
first area after the access verification information is
acquired.
[0068] To describe with reference to practical application, a
mutual trust platform corresponding to the first area receives the
download request sent by the vehicle, and the download request
includes a security credential of the vehicle. The download request
is used to request to download a trusted root certificate list of
the mutual trust platform. The trusted root certificate list
includes respective root certificates and download addresses of
trusted domain certificate lists of a local certificate system of
the mutual trust platform and at least one external certificate
system, where the at least one external certificate system includes
the external certificate system to which the vehicle belongs.
[0069] The trusted root certificate list of the mutual trust
platform in the embodiment of the present disclosure is the same as
that in the above mentioned embodiments, which will not be repeated
herein. The mutual trust platform receives the download request
sent by the vehicle, where the security credential included in the
download request is the authentication information, and the
security credential may be provided in advance by the mutual trust
platform, for example, the security credential may be a certificate
or a token, etc.
[0070] The mutual trust platform corresponding to the first area
authenticates the download request of the vehicle according to the
security credential, for example, determine whether the security
credential of the vehicle is expired, and after authentication is
passed, the mutual trust platform can send the trusted root
certificate list to the vehicle, such that the vehicle can acquire
trusted domain certificate lists of respective certificate systems
according to the download address of the trusted domain certificate
list of the local certificate system and the external certificate
system in the trusted root certificate list, thereby realizing
mutual trust and communication to the local V2X device in the first
area and the V2X device in other external certificate systems.
[0071] In the vehicle communication method in the embodiment of the
present disclosure, a trusted root certificate list is provided by
the mutual trust platform, and the vehicle requests to the mutual
trust platform to download the trusted root certificate list, the
mutual trust platform can authenticate through the security
credential in the download request and send the trusted root
certificate list to the vehicle after authentication is passed,
such that the vehicle can acquire related information of the
certificate of the local certificate system and the external
certificate system of the intelligent traffic area maintained
therein, thereby realizing mutual trust and communication to the
local V2X device of the intelligent traffic area and the V2X device
subordinated in the external certificate system in the intelligent
traffic area.
[0072] FIG. 4 is a flowchart diagram of a vehicle communication
method provided by the embodiment of the present disclosure. The
method is applied to a server corresponding to a vehicle. As shown
in FIG. 4, the method includes:
[0073] S401, acquiring authentication information and a vehicle
registration service interface from a server corresponding to a
first area.
[0074] In a scenario where the vehicle needs to communicate with a
V2X device in an intelligent traffic area, the vehicle can first
acquire the authentication information and the vehicle registration
service interface from the server corresponding to the first area
through the server corresponding to the vehicle. The server
corresponding to the vehicle may be a server of an entity to which
the vehicle belongs to. The vehicle registration service interface
is used to send a vehicle registration request to the server
corresponding to the first area by using the authentication
information to obtain a download address of access verification
information, the authentication information is used to authenticate
the vehicle registration request. The access verification
information includes a first download address of first
sub-verification information and first root verification
information corresponding to the first area, and a second download
address of second sub-verification information and second root
verification information corresponding to the vehicle. The access
verification information is the same as that in the above mentioned
embodiments, which will not be repeated herein.
[0075] S402, sending the authentication information and the vehicle
registration service interface to the vehicle.
[0076] The server corresponding to the vehicle acquires the
authentication information and the vehicle registration service
interface and send them to the vehicle, such that the vehicle can
send the vehicle registration request to the server corresponding
to the first area by using the authentication information to obtain
the download address of the access verification information, and
then send a download request to the server corresponding to the
first area according to the download address of the access
verification information to obtain the first sub-verification
information and the first root verification information
corresponding to the first area, and the second sub-verification
information and the second root verification information
corresponding to the vehicle. Then the vehicle can further realize
mutual trust and communication to a communication device within the
first area according to the first sub-verification information and
the first root verification information corresponding to the first
area, and the second sub-verification information and the second
root verification information corresponding to the vehicle.
[0077] In the vehicle communication method in the embodiment of the
present disclosure, the server corresponding to the vehicle
acquires the authentication information and the vehicle
registration service interface through the server corresponding to
the first area, and sends them to a subordinated vehicle, so that
the vehicle can request to the server corresponding to the first
area to register the vehicle to obtain the access verification
information, so as to obtain the first sub-verification information
and the first root verification information corresponding to the
first area, and the second sub-verification information and the
second root verification information corresponding to the vehicle,
thereby realizing mutual trust and communication to the
communication device within the first area.
[0078] Description will be made with reference to practical
application. The server corresponding to the vehicle may be the
server of the entity to which the vehicle belongs to, that is, the
server of the external certificate system to which the vehicle
belongs. The server of the external certificate system to which the
vehicle belongs acquires a security credential and the vehicle
registration service interface from a mutual trust platform of the
first area, where the security credential is the above mentioned
authentication information.
[0079] The server of the external certificate system to which the
vehicle belongs send the security credential and the vehicle
registration service interface to respective vehicles subordinated
to the external certificate system, such that the vehicle can send
the vehicle registration request to the mutual trust platform of
the first area by using the security credential, to obtain a
download address of a trusted root certificate list of the mutual
trust platform, similar to the above mentioned embodiment, the
trusted root certificate list includes download addresses of
respective root certificates and trusted domain certificate lists
of a local certificate system of the area to which the mutual trust
platform belongs to and at least one external certificate system.
Thus the vehicle can further obtain trusted domain certificate
lists of respective certificate systems according to download
addresses of trusted domain certificate lists of respective
certificate systems, and realize mutual trust and communication to
the local V2X device in the intelligent traffic area and V2X
devices of other external certificate systems.
[0080] In the vehicle communication method of the embodiment of the
present disclosure, a server device of the external certificate
system to which the vehicle belongs acquires the security
credential and the vehicle registration service interface through
the mutual trust platform, and sends them to respective
subordinated vehicles, such that the vehicle can request
registration to the mutual trust platform to acquire trusted root
certificate list of the mutual trust platform, and acquire related
information of the certificate of the local certificate system and
the external certificate system through the trusted root
certificate list, thereby realizing mutual trust and communication
to the local V2X device of the intelligent traffic area and the V2X
device subordinated in the external certificate system in the
intelligent traffic area.
[0081] On the basis of the above embodiments, with reference to the
interaction process between the server of the external certificate
system, the mutual trust platform and the vehicle shown in FIG. 5,
the vehicle communication method provided by the embodiments of the
present disclosure will be further described. It should be noted
that, in the following embodiment, as shown in FIG. 5, the method
includes:
[0082] S501, the server of the external certificate system sends a
mutual trust registration request to the mutual trust platform.
[0083] The mutual trust registration request includes registration
information of the external certificate system and certificate
information of the external certificate system. The server of the
external certificate system is the server corresponding to the
above vehicle.
[0084] The registration information may include information of the
external certificate system such as an organization name, a
category (such as alliance ecology, organization or vehicle company
OEM), an organization credential, etc. The registration information
may further include a manner of vehicle registration
authentication, for example, quata-License (License), vehicle white
list, etc. The quata License restricts a number of V2X devices of
the external certificate system that can access to the mutual trust
platform, and the vehicle white list restricts specific vehicle of
the external certificate system that can access the mutual trust
platform.
[0085] The certificate information of the external certificate
system is related to the category of the external certificate
system, the certificate information of the external certificate
system is the verification information corresponding to the server
corresponding to the vehicle, optionally, the verification
information corresponding to the server corresponding to the
vehicle includes the download address of the second
sub-verification information and the second root verification
information corresponding to the vehicle, for example, for the
alliance ecology, the certificate information needs to be included
in its registration request is the root certificate and the
download address of the trusted domain certificate list of the
certificate system of the alliance ecology, or, the verification
information corresponding to the server corresponding to the
vehicle includes the sub-verification information corresponding to
the server corresponding to the vehicle, for example, for an
organization or a vehicle company OEM, the certificate information
needs to be included in the registration request thereof is a
domain certificate of the certificate system of the organization or
the vehicle company OEM.
[0086] In addition, it should be further noted that, in addition to
sending the registration request of the external certificate system
to the mutual trust platform online, the registration request can
also be sent offline, for example, a management person of the
external certificate system performs offline application by the
means of mail.
[0087] S502, the mutual trust platform generates the security
credential of the external certificate system, and sends the
security credential and the V2X device registration service
interface to the server of the external certificate system.
[0088] The mutual trust platform first examines the registration
request of the external certificate system according to the
registration information, the mutual trust platform can examine the
registration request of the external certificate system according
to the information, such as the organization name, the organization
credential etc., in the registration information to determine
whether the external certificate system can access to the mutual
trust platform, thereby improving security. After the examination
is passed, the certificate information of the external certificate
system is added to the trusted root certificate list. At the same
time, the mutual trust platform can also store and record the
information carried in the registration request of the external
certificate system for convenience of later inquiry.
[0089] Optionally, the certificate information of the external
certificate system includes the root certificate and the download
address of the trusted domain certificate list of the external
certificate system, the mutual trust platform adds the root
certificate and the download address of the trusted domain
certificate list of the external certificate system to the trusted
root certificate list.
[0090] Optionally, the certificate information of the external
certificate system includes the trusted domain certificate of the
external certificate system; the mutual trust platform generates a
common root certificate and trusted domain certificate list of the
external certificate system and other external certificate systems
according to the trusted domain certificate of the external
certificate system and trusted domain certificates of other
external certificate systems; the common root certificate and
trusted domain certificate list of the external certificate system
and other external certificate systems are added to the trusted
root certificate list.
[0091] For example, as shown in FIG. 6, when the external
certificate system is the alliance ecology, the certificate
information thereof includes the root certificate and the download
address of the trusted domain certificate list of the alliance
ecology. When the external certificate system is the organization
or the vehicle company OEM, the certificate information thereof
includes the trusted domain certificate of the organization or the
vehicle company OEM. The trusted root certificate list authority
(TRCLA) of the mutual trust platform adds the root certificate and
the download address of the trusted domain certificate list of the
alliance ecology to the trusted root certificate list. And the
trusted domain certificates of all organizations and vehicle
company OEM accessed to the mutual trust platform are generated as
a document of the trusted domain certificate list of the
organization and the vehicle company OEM, and its root certificate
is generated. The document of the trusted domain certificate list
of the organization and the vehicle company OEM are signed by
TRCLA, and services of updating and downloading are provided. The
mutual trust platform adds the download address of the trusted
domain certificate list and the root certificate of the
organization and the vehicle company OEM to the trusted root
certificate list. In addition, the trusted root certificate list
further includes the root certificate and the download address of
the trusted domain certificate list of the local certificate system
of the intelligent traffic area corresponding to the mutual trust
platform. It should be noted that, when the external certificate
system does not request to register and access to the mutual trust
platform, the trusted root certificate list only includes the root
certificate and the download address of the trusted domain
certificate list of the local certificate system.
[0092] After the examination by the mutual trust platform to the
mutual trust registration request is passed, the security
credential is generated for the external certificate system, and
the security credential can be used for authentication of the
vehicle. At the same time, the security credential further includes
identifying information of the external certificate system, which
can be used to distinguish different external certificate systems.
The security credential can be in a form of a certificate or a
character string, etc., which is not limited by the embodiment of
the present disclosure.
[0093] S503, the server of the external certificate system sends
the security credential and the vehicle registration service
interface to the vehicle subordinated to the external certificate
system.
[0094] S504, the vehicle sends the vehicle registration request to
the mutual trust platform according to the vehicle registration
service interface.
[0095] The vehicle registration request includes the security
credential of the vehicle, where the security credential is used by
the mutual trust platform to authenticate the vehicle registration
request.
[0096] After entering the intelligent traffic area, the vehicle
sends the vehicle registration request to the mutual trust platform
according to the vehicle registration service interface of the
intelligent traffic area, to request to access to the mutual trust
platform. The registration request further includes, in addition to
the security credential, an identifier of the vehicle, where the
identifier of the vehicle can be used to exclusively identify the
vehicle, for example, the identifier may be information such as a
vehicle identification number (VIN) or a vehicle license plate
number, etc., and the VIN is consisted of characters or numbers,
which is a unique set of numbers used on a vehicle, and can
identify information, such as a manufacturer, an engine, a chassis
serial number or other performance, etc., of the car.
[0097] S505, the mutual trust platform authenticates the vehicle
registration request according to the security credential, and
sends the download address of the trusted root certificate list to
the vehicle after authentication is passed.
[0098] The mutual trust platform verifies whether the security
credential of the vehicle is valid, whether the License of the
external certificate system to which the vehicle belongs is full,
or whether the vehicle is in the vehicle white list of the external
certificate system to which the vehicle belongs, stores the
information of the vehicle after authentication is passed, and
returns the TRCLA certificate and the download address of the
trusted root certificate list to the vehicle. The mutual trust
platform uses the security credential to authenticate the vehicle
registration request, thereby ensuring security.
[0099] S506, the vehicle sends the download request to the mutual
trust platform according to the download address of the trusted
root certificate list of the mutual trust platform.
[0100] The download request includes the security credential of the
vehicle, where the security credential is used by the mutual trust
platform to authenticate the download request.
[0101] After successfully registering the mutual trust platform,
the vehicle can periodically request to the TRCLA of the mutual
trust platform to download the trusted root certificate list, to
acquire the latest trusted root certificate list. The download
request may further include, in addition to the security
credential, the identifier of the vehicle.
[0102] S507, the mutual trust platform authenticates the download
request according to the security credential, and sends the trusted
root certificate list to the vehicle after authentication is
passed.
[0103] The TRCLA of the mutual trust platform will authenticate the
download request of the vehicle, for example, inspect whether the
vehicle is registered, and authenticate whether the security
credential of the vehicle is valid, and return the trusted root
certificate list to the vehicle that is successfully authenticated.
The mutual trust platform uses the security credential to
authenticate the download request, thereby ensuring security.
[0104] S508, the vehicle download the trusted domain certificate
list according to the download address of the trusted domain
certificate list, and import the root certificate and the trusted
domain certificate list to a trust certificate list of the
vehicle.
[0105] The trust certificate list is trust verification information
of the vehicle.
[0106] S509, the vehicle communicates with the V2X device in the
area corresponding to the mutual trust platform according to the
trust certificate list.
[0107] In the vehicle communication method provided by the
embodiments of the present disclosure, a trust island of respective
certificate systems is broken through a mutual trust platform, when
the respective certificate systems, such as alliance ecology,
organization and vehicle company OEM, wish to access the
intelligent traffic area, the mutual trust registration application
can be raised to the mutual trust platform, and such external
certificate systems can be brought into a trust domain for
management after the mutual trust platform accepts the mutual trust
registration application. Afterwards, the mutual trust platform can
grant the security credential to such external certificate systems,
such that the vehicle of the external certificate system can use
the security credential to register to the mutual trust platform,
and acquire related certificates of the respective certificate
systems from the mutual trust platform, thereby realizing
information safe authentication between the local V2X device and
vehicles of different external certificate systems, and realizing
mutual trust and communication. At the same time, the mutual trust
platform realizes fine-grained management to the V2X device, such
that the V2X can access to the network in order, which avoids
random spread of information of the V2X device which will cause
traffic congestion or disturb traffic order, and avoids hazards
like traffic accident, etc.
[0108] FIG. 7 is a structural schematic diagram of a vehicle
communication apparatus provided by an embodiment of the present
disclosure. As shown in FIG. 7, the vehicle communication apparatus
700 includes:
[0109] an acquiring module 701, configured to acquire first root
verification information and a first download address corresponding
to a first area, and second root verification information and a
second download address corresponding to the vehicle;
[0110] a downloading module 702, configured to download first
sub-verification information corresponding to the first area
according to the first download address, where the first root
verification information is used to verify correctness of the first
sub-verification information; and download second sub-verification
information corresponding to the vehicle according to the second
download address, where the second root verification information is
used to verify correctness of the second sub-verification
information;
[0111] a communicating module 703, configured to communicate with a
communication device within the first area according to the first
root verification information, the first sub-verification
information, the second root verification information and the
second sub-verification information.
[0112] In an embodiment, the acquiring module 701 includes:
[0113] an acquiring unit, configured to acquire access verification
information from a server corresponding to the first area, where
the access verification information includes the first root
verification information and the first download address
corresponding to the first area, and the second root verification
information and the second download address corresponding to the
vehicle.
[0114] In an embodiment, the acquiring unit includes:
[0115] a first sending unit, configured to send a download request
to the server corresponding to the first area according to a
download address of the access verification information, where the
download request includes authentication information of the
vehicle, and the authentication information is used to authenticate
the download request;
[0116] a first receiving unit, configured to receive the access
verification information sent by the server corresponding to the
first area.
[0117] In an embodiment, the communication apparatus 700 of the V2X
device further includes:
[0118] a sending module, configured to send a vehicle registration
request to the server corresponding to the first area, where the
vehicle registration request includes the authentication
information of the vehicle, and the authentication information is
used to authenticate the vehicle registration request;
[0119] a receiving module, configured to receive a download address
of the access verification information sent by the server
corresponding to the first area.
[0120] In an embodiment, the sending module includes:
[0121] a second receiving unit, configured to receive the
authentication information and a vehicle registration service
interface sent by a server corresponding to the vehicle, where the
authentication information and the vehicle registration service
interface are acquired in advance by the server corresponding to
the vehicle from the server corresponding to the first area;
[0122] a second sending unit, configured to send the vehicle
registration request to the server corresponding to the first area
according to the vehicle registration service interface.
[0123] In an embodiment, the communicating module 703 includes:
[0124] an importing unit, configured to import the first root
verification information, the first sub-verification information,
the second root verification information and the second
sub-verification information into trust verification information of
the vehicle;
[0125] a communicating unit, configured to communicate with the
communication device within the first area according to the trust
verification information.
[0126] The vehicle communication apparatus provided by the
embodiment of the present disclosure can be used to execute the
vehicle communication method in the above method embodiments, and
the realization principle and the technical effect thereof are
similar, which will not be repeated herein.
[0127] FIG. 8 is a structural schematic diagram of a vehicle
communication apparatus provided by an embodiment of the present
disclosure. As shown in FIG. 8, the vehicle communication apparatus
800 includes:
[0128] a receiving module 801, configured to receive a download
request sent by the vehicle, where the download request is used to
request to download access verification information, the download
request includes authentication information of the vehicle, and the
access verification information includes a first download address
of first sub-verification information and first root verification
information corresponding to a first area, and a second download
address of second sub-verification information and second root
verification information corresponding to the vehicle;
[0129] a sending module 802, configured to authenticate the
download request according to the authentication information, and
send the access verification information to the vehicle after
authentication is passed.
[0130] In an embodiment, the receiving module 801 is further
configured to receive a vehicle registration request sent by the
vehicle, where the vehicle registration request includes the
authentication information;
[0131] the sending module 802 is further configured to authenticate
the vehicle registration request according to the authentication
information, and send a download address of the access verification
information to the vehicle after authentication is passed.
[0132] In an embodiment, the receiving module 801 is further
configured to receive a mutual trust registration request sent by a
server corresponding to the vehicle, where the mutual trust
registration request includes verification information
corresponding to the server corresponding to the vehicle;
[0133] the apparatus further includes: a processing module,
configured to add the verification information corresponding to the
server corresponding to the vehicle into the access verification
information, and generate the authentication information;
[0134] the sending module 802 is further configured to send the
authentication information and a vehicle registration service
interface to the server corresponding to the vehicle, so that the
server corresponding to the vehicle sends the authentication
information and the vehicle registration service interface to the
vehicle.
[0135] In an embodiment, the verification information corresponding
to the server corresponding to the vehicle includes the second
download address of the second sub-verification information and the
second root verification information.
[0136] In an embodiment, the verification information corresponding
to the server corresponding to the vehicle includes
sub-verification information corresponding to the server
corresponding to the vehicle;
[0137] the processing module includes:
[0138] a generating unit, configured to generate the second
sub-verification information and the second root verification
information according to the sub-verification information
corresponding to the server corresponding to the vehicle and
sub-verification information corresponding to other servers
corresponding to other vehicles;
[0139] a processing unit, configured to add the second download
address of the second sub-verification information and the second
root verification information into the access verification
information.
[0140] The vehicle communication apparatus provided by the
embodiment of the present disclosure can be used to execute the
vehicle communication method in the method embodiments, and the
realization principle and the technical effect thereof are similar,
which will not be repeated herein.
[0141] FIG. 9 is a structural schematic diagram of a vehicle
communication apparatus provided by an embodiment of the present
disclosure. As shown in FIG. 9, the vehicle communication apparatus
900 includes:
[0142] an acquiring module 901, configured to acquire
authentication information and a vehicle registration service
interface from a server corresponding to a first area;
[0143] a sending module 902, configured to send the authentication
information and the vehicle registration service interface to the
vehicle;
[0144] where the vehicle registration service interface is used to
send a vehicle registration request to the server corresponding to
the first area, to obtain a download address of access verification
information; the authentication information is used to authenticate
the vehicle registration request, and the access verification
information includes a first download address of first
sub-verification information and first root verification
information corresponding to the first area, and a second download
address of second sub-verification information and second root
verification information corresponding to the vehicle.
[0145] In an embodiment, the acquiring module 901 includes:
[0146] a sending unit, configured to send a mutual trust
registration request to the server corresponding to the first area,
where the mutual trust registration request includes verification
information corresponding to a server corresponding to the
vehicle;
[0147] a receiving unit, configured to receive the authentication
information and the vehicle registration service interface sent by
the server corresponding to the first area.
[0148] In an embodiment, the verification information corresponding
to the server corresponding to the vehicle includes the second
download address of the second sub-verification information and the
second root verification information.
[0149] In an embodiment, the verification information corresponding
to the server corresponding to the vehicle includes
sub-verification information corresponding to the server
corresponding to the vehicle.
[0150] The vehicle communication apparatus provided by the
embodiment of the present disclosure can be used to execute the
vehicle communication method in the method embodiments, and the
realization principle and the technical effect thereof are similar,
which will not be repeated herein.
[0151] According to the embodiment of the present disclosure, the
present disclosure further provides an electronic device and a
non-transitory computer readable storage medium storing a computer
instruction.
[0152] According to the embodiment of the present disclosure, the
present disclosure further provides a computer program product,
where the program product includes: a computer program stored in a
readable storage medium, and at least one processor of an
electronic device can read the computer program from the readable
storage medium, and the at least one processor executes the
computer program to cause the electronic device to execute the
method provided by any one of the above embodiments.
[0153] FIG. 10 is a schematic block diagram of an electronic device
used to realize the vehicle communication method of the embodiments
of the present disclosure. The electronic device intends to
represent digital computers of various forms, for example, laptop
computers, desktop computers, workstations, personal digital
assistants, servers, blade servers, mainframe computers and other
suitable computers. The electronic device can also represent mobile
apparatuses of various forms, for example, personal digital
assistance, cellular phone, smart phones, wearable devices and
other similar computing apparatuses. The components, their
connections and relationships, and their functions shown herein are
only examples, and are not intended to limit the implementation of
the present disclosure described and/or claimed herein. The
electronic device can be servers of the vehicle, the V2X device,
the mutual trust platform or the external certificate system in the
above embodiments.
[0154] As shown in FIG. 10, the electronic device 1000 includes a
computing unit 1001, which can execute various appropriate actions
and processing according to a computer program stored in a
read-only memory (ROM) 1002 or a computer program loaded from a
storage unit 1008 to a random access memory (RAM) 1003. The RAM
1003 may further store various programs and data needed for the
electronic device 1000 to operate. The computing unit 1001, the ROM
1002 and the RAM 1003 are connected to each other through a bus
1004. An input/output (I/O) interface 1005 is also connected to the
bus 1004.
[0155] A plurality of components in the electronic device 1000 are
connected to the I/O interface 1005, including: an input unit 1006,
such as a keyboard, a mouse, etc.; an output unit 1007, such as
various types of displays, speakers, etc.; a storage unit 1008,
such as a magnetic disk, an optical disk, etc.; and a communicating
unit 1009, such as a network card, a modem, a wireless
communication transceiver, etc. The communicating unit 1009 allows
the electronic device 1000 to exchange information/data with other
devices through a computer network such as the Internet and/or
various telecommunication networks.
[0156] The computing unit 1001 may be various universal and/or
specific processing components having ability of processing and
computing. Some examples of the computing unit 1001 include, but
are not limited to, central processing units (CPU), graphic
processing units (GPU), various specific artificial intelligent
(AI) computing chips, various computing units running machine
learning module algorithms, digital signal processors (DSP), and
any appropriate processors, controllers and micro-controllers, etc.
The computing unit 1001 executes respective methods and processing
described above, for example, the vehicle communication method. For
example, in some embodiments, the vehicle communication method can
be realized as a computer software program, which is tangibly
contained in a machine-readable medium such as the storage unit
1008. In some embodiments, part or all of a computer program can be
loaded and/or installed on the electronic device 1000 through the
ROM 1002 and/or the communicating unit 1009. When the computer
program is loaded on the RAM 1003 and is executed by the computing
unit 1001, one or more steps of the vehicle communication method
described above can be executed. Alternatively, in other
embodiments, the computing unit 1001 can be configured to execute
the vehicle communication method through any other appropriate
manners (for example, by means of firmware).
[0157] Various embodiments of the systems and technologies
described above herein can be implemented in digital electronic
circuit system, integrated circuit system, field programmable gate
array (FPGA), application specific integrated circuit (ASIC),
application specific standard product (ASSP), system on chip (SOC),
load programmable logic device (CPLD), computer hardware, firmware,
software, and/or the combination thereof. These various embodiments
may include: being implemented in one or more computer programs,
the one or more computer programs can be executed and/or
interpreted on a programmable system including at least one
programmable processor, which can be a specific or universal
programmable processor that can receive data and instructions from
a storage system, at least one input apparatus, and at least one
output apparatus and transmit the data and instructions to the
storage system, the at least one input apparatus, and the at least
one output apparatus.
[0158] The program code for implementing the method of the present
disclosure can be written in any combination of one or more
programming languages. These program codes can be provided to a
processor or controller of a universal computer, a specific
computer or other programmable data processing apparatuses, so that
the program codes, when executed by the processor or controller,
cause the functions/operations specified in the flowchart and/or
block diagrams to be implemented. The program codes can be
completely executed on the machine, partially executed on the
machine, partially executed on the machine as an independent
software package and partially executed on the remote machine or
completely executed on the remote machine or server.
[0159] In the context of the present disclosure, the
machine-readable medium can be a tangible medium that can contain
or store a program for use by an execution system, an apparatus or
a device or for use in connection with the execution system, the
apparatus or the device. The machine-readable medium can be a
machine-readable signal medium or a machine-readable storage
medium. The machine-readable medium may include, but is not limited
to, electronic, magnetic, optical, electromagnetic, infrared, or
semiconductor systems, apparatuses or devices, or any suitable
combination thereof. More specific examples of the machine-readable
storage medium may include electrical connection based on one or
more wires, portable computer disk, hard disk, random access memory
(RAM), read-only memory (ROM), erasable programmable read-only
memory (EPROM or flash memory), optical fiber, portable compact
disk read-only memory (CD-ROM), optical storage device, magnetic
storage device, or any suitable combination thereof.
[0160] To provide interaction with users, the systems and
technologies described herein can be implemented on a computer with
a display device (for example, CRT (cathode ray tube) or LCD
(liquid crystal display) monitor) for displaying information to
users; and a keyboard and pointing device (for example, a mouse or
a trackball) through which a user can provide input to the
computer. Other kinds of apparatuses can also be used to provide
interaction with users; for example, the feedback provided to the
user can be any form of sensory feedbacks (for example, visual
feedback, auditory feedback, or tactile feedback); and can receive
the input from the user in any form (including acoustic input,
voice input or tactile input).
[0161] The systems and technologies described herein can be
implemented in a computing system including a back-end component
(e.g., as a data server), or a computing system including a
middleware component (e.g., an application server), or a computing
system including a front-end component (e.g., a user computer with
a graphical user interface or a web browser through which users can
interact with the embodiments of the systems and technologies
described herein), or computing system including any combination of
such back-end components, middleware components, or front-end
components. The components of the system can be connected to each
other by any form or medium of digital data communication (for
example, communication network). Examples of communication networks
include local area network (LAN), wide area network (WAN) and the
Internet.
[0162] The computer system may include a client and a server. The
client and the server are generally far away from each other and
usually interact through a communication network. The relationship
between the client and the server is generated by running computer
programs having a client-server relationship with each other on
corresponding computers. The server can be a cloud server, also
known as cloud computing server or cloud host, which is a host
product in the cloud computing service system and solves the
defects of the traditional physical host and VPS service ("Virtual
Private Server", or "VPS" for short), which are difficult to manage
and weak in business scalability. The server can also be a
distributed system server or a server combined with block
chain.
[0163] It should be understood that various forms of processes
shown above can be used to reorder, add or delete steps. For
example, the various steps described in the present disclosure can
be executed in parallel, sequentially or in a different order, so
long as the desired results of the technical solution disclosed in
the present disclosure can be achieved, which is not limited
herein.
[0164] The above specific embodiments do not limit the scope of
protection of the present disclosure. Those skilled in the art
should understand that various modifications, combinations,
sub-combinations and substitutions can be made according to the
design requirements and other factors. Any modification, equivalent
substitution and improvement and so on within the spirit and
principle of the present disclosure should be included in the scope
of protection of the present disclosure.
* * * * *